Domain Name Service (DNS)
- DNS Server Role Introduction
- DNS Architecture
- Creating and Managing DNS Zones
- DNS Zone Transfers
- Dynamic DNS
- Integration with Active Directory
Active Directory Domain Services
- Active Directory DNS Naming Strategy
- DNS AD-Integrated Zones
- Active Directory Architecture
- Scripting AD Object Configuration
- AD Trust Relationships
- Read-Only Domain Controller (RODC) Configuration
Upgrading Active Directory DS
- Legacy and Alternate Directory Structures
- Consolidating Forests, Trees and Domains
- Migrating Users, Computers and Resources
- Active Directory Migration Tool (ADMT)
- Preparing the Directory with ADPREP
AD DS Sites and Replication
- Creating and Managing AD Sites
- Site Topology
- DFS Replication Overview
- SYSVOL Replication
- Replication Monitoring and Troubleshooting
- Knowledge Consistency Checker (KCC)
AD DS Maintenance and Monitoring
- Server 2008 Monitoring Tools
- Flexible Single Master of Operations (FSMO) Roles
- Backing Up the AD Database
- Restore Methods
- Troubleshooting AD and Group Policy
- Cleaning Up AD with NTDSUTIL
- Global Catalog Servers
Active Directory Schema
- Defining the Active Directory Schema
- Administering the Active Directory Schema
- Schema Modification
- Object Classes and Attributes
- Deactivating Schema Objects
Active Directory in the Enterprise
- AD Lightweight Directory Services (AD LDS)
- Integrating AD LDS with Applications
- AD Rights Management Services (AD RMS)
- AD Federation Services (ADFS)
- Inter-site Authentication with ADFS
Group Policy Objects (GPO)
- Group Policy Overview
- Centralized Configuration
- Domain and Local Policies
- Policy Scope
- Policy Inheritance
- Security Configuration Wizard (SCW)
- GPO Replication
- Converting Legacy Policies
- Troubleshooting Conflicts and Inheritance
GPO User Configuration
- Login Scripts
- Folder Redirection
- User Rights
- Desktop Restrictions
- Application Limitations
- Deploying User Software with .msi Files
GPO Computer Configuration
- Assigning Applications to the Desktop
- Security Settings
- Policy Refresh Interval
- Loopback Processing
GPO Security
- Reducing Attack Surface through GPO
- Creating Security Policies
- Using Custom Templates
- Fine-Grained Password Policies
- Software Restrictions
GPO Administration
- Refreshing the Policy Manually
- Delegating GPO Administration
- Group Policy Management Console (GPMC)
- Combining Policies
- Disabling GPOs
- No Override
- Block Inheritance
Group Policy Management Console
- Analyzing Resultant Set of Policy (RSoP)
- Group Policy Modeling
- Importing Policies
- Backup and Restore GPOs
Windows Management Interface (WMI) Filters
- Filtering the Application of GPOs
- Introduction to Writing Filters
- WMI Query Language (WQL)
Group Policy Software Deployment
- Assigning Software to Users or Computers
- Publishing Applications to Users
- Upgrading and Removing Applications
- Customizing Distributed Software
Active Directory Certificate Services
- Public Key Infrastructure (PKI)
- Installing Active Directory Certificate Services
- Web-based Certificate Request
- Granting and Revoking Certificates
- Publishing the Certificate Revocation List
- Exporting Keys
- PKI Applications and Uses
- Certificate Authorities
- Certificate Templates
Remote Access
- Virtual Private Network (VPN) Configuration
- VPN and Authentication Protocols
- Remote Access Policies
- Network Policy Server (NPS) Introduction
- Configuring a RADIUS Server
- Troubleshooting
IPSec
- Securing Communication
- IPSec Protocols
- Planning Policies
- Configuring Authentication and Encryption
- Connection Rules
- Troubleshooting IPSec Implementations